Designing and implementing malicious hardware. In: (2008)

by King ST, J Tucek, A Cozzie, C Grier, W Jiang, Y Zhou
Venue:Proceedings of 1st Usenix Workshop on Large-Scale Exploits and Emergent Threats,